Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Problem:
(a) Explain how TCP handles connection-setup management.
(b) Each host on the Internet is currently assigned an IP address 32 bits long (IPv4). IPv4 addresses are usually written as a series of four decimal numbers. IPv4 addresses traditionally belong to one of five classes of address, depending on the type of network.
i. Give the address range for a Class D network. ii. What are Class D network addresses primarily used for? iii. Can two hosts A and B with IP addresses 172.16.17.25 and 172.16.27.25 respectively communicate directly with each other if they share a subnet mask of 255.255.248.0? iv. Describe one short-term technique which has been used to solve the shortage of IPv4 addresses?
(c) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem.
You should give the value of the key fields used in fragmentation for each fragment created.
Question : (a) Several techniques are now available for users to connect to the Internet. (i) A modem is commonly used to dial up to the Internet. Why is a modem needed fo
What the Semantic Web is? Ans) The Semantic Web is a vision, that thinks to join together dispersed bits of data on the internet, very much like web pages are presently joined
Fragmentation - Wireless environment is very noisy - Corrupt frames must be retransmitted - Large frames must be divided into smaller ones to increase efficiency
What are different ways of securing a computer network? There are lots of ways to do this. Install reliable and updated anti-virus program on all computers. Make sure firewalls
Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut
How Intranet is different from Internet? Generally an Intranet is different from an Internet in the following ways: i. Intranet is a network within the organisation whereas
what is similarity of wifi and 3g
Describe the concept of broad cast and multi-cast?
With a database server, the client gives SQL requests as messages to the database server. The results of every SQL command are returned over the network. The server uses its own pr
Persistent and No persistent Connections HTTP can use both persistent and non persistent connection. By defaults uses persistent connections. Persistent Connections
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd